Policy-driven reflective enforcement of security policies

Practical experience has shown that separating security enforcement code from functional code using separation of concerns techniques such as behavioural reflection leads to improvements in code undestandability and maintainability. However, using these techniques at requires providing a consistent and declarative way to specify policies. We have developed a prototype tool that allows the use of Ponder policies that are enforced by the Kava metaobject protocol. This prototype translates high-level policies into configuration files used to enforce the policies upon Java applications.

[1]  Ian Welch,et al.  Re-engineering Security as a Crosscutting Concern , 2003, Comput. J..

[2]  Hemma Prafullchandra,et al.  Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.

[3]  Antonio Corradi,et al.  A flexible access control service for Java mobile code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[4]  Guy L. Steele,et al.  The Java Language Specification , 1996 .

[5]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[6]  William G. Griswold,et al.  An Overview of AspectJ , 2001, ECOOP.

[7]  Tim Howes,et al.  The String Representation of Standard Attribute Syntaxes , 1995, RFC.

[8]  Ian Welch,et al.  Kava - Using Byte code Rewriting to add Behavioural Reflection to Java , 2001, COOTS.

[9]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[10]  Ian Welch,et al.  Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code , 2002, J. Comput. Secur..

[11]  David E. Evans,et al.  Flexible policy-directed code safety , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).